Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 01:32
Behavioral task
behavioral1
Sample
20afe1045ff444b76a6c58cf9e5eb759.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20afe1045ff444b76a6c58cf9e5eb759.exe
Resource
win10v2004-20231215-en
General
-
Target
20afe1045ff444b76a6c58cf9e5eb759.exe
-
Size
248KB
-
MD5
20afe1045ff444b76a6c58cf9e5eb759
-
SHA1
94f17fa9dc5056ee935e6a07d68aff146044ea25
-
SHA256
5aebcf368c5b27fb49ea82ced98190a059b7621d1d4474985551973618c88840
-
SHA512
2df6bdfd54a28edb007a9267f7d3ffc7559ff57d9351ebc3c495ee3a8695fbd622cb7248f9d380468084ba1a5e7848ddf2e7c464f25b868800a2f028511df5a4
-
SSDEEP
6144:tJzCsX/4vxnuoRPb2pSDHbfFIAeaNdevMVL5ZVS:tJzCaAfRT7/i9aNdEMl5ZVS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3656-0-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral2/memory/3656-1-0x0000000000400000-0x00000000004A2000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3656-1-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3120 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 3656 20afe1045ff444b76a6c58cf9e5eb759.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3656 wrote to memory of 3088 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 57 PID 3656 wrote to memory of 3088 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 57 PID 3656 wrote to memory of 3088 3656 20afe1045ff444b76a6c58cf9e5eb759.exe 57 PID 3088 wrote to memory of 3120 3088 cmd.exe 95 PID 3088 wrote to memory of 3120 3088 cmd.exe 95 PID 3088 wrote to memory of 3120 3088 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\20afe1045ff444b76a6c58cf9e5eb759.exe"C:\Users\Admin\AppData\Local\Temp\20afe1045ff444b76a6c58cf9e5eb759.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query GSGIoService2⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\sc.exesc query GSGIoService3⤵
- Launches sc.exe
PID:3120
-
-